Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide
Information Sciences Research Methodology PG (6797) ICT Eng Research Methods (9826) Assignment 2 Guide
The frameworks for maturity evaluation developed by ISACA and NIST were incorporated as the
logical basis. Determine the functional requirements (depending on the market opportunities and
competitive analysis), then research, create, and perform testing to determine whether or not it
fulfils the requirements of the customer requirements. When designing SHD structures, safety
considerations should be taken into consideration, with techniques including how constituents
may be connected being implemented. These encryption methods indicate to potential ways in
which SHEs might be built to increase security while reducing data accessibility. There are two
number of security options: first, a "Protection And management Methodology," and second,
"Privacy Functionality for Hardware and Software." Both of these elements are included in the
planning process throughout the SHD's whole lifetime.
Methods
Due to the fact that quantitative techniques enable us to systematically calculate parameters and
test hypotheses, the statistical approach will be utilised in the models and strategies of computer
security of smart homes. Retailers are constantly relying on the Internet of Things (IoT) to
improve the efficiency and effectiveness of operations, processes, and products. However,
whereas technology provides infinite opportunities, it also presents tremendous challenges,
particularly in the case of cyber attacks and the related security procedures. How do we ensure
the safety and reliability of interconnected devices all across the universe? 'Data protection by
Layout' is indeed a realistic and rational approach for cyber defense. Numerous cyber-threats
pose a danger to the public, prosperity, and wellbeing of individuals who live in 'Smart Homes,'
according to the FBI. In order to make this research more efficient, they were selected as an input
factor. Incorporating the methodology of "urban planning," we developed a complete strategy for
safeguarding Smart Home Environments (SHEs) from intrusions, with a strong emphasis on "good
practises" that may be applied all across the entire lifecycle of the SHE. In accordance with these
suggested practises, a 'Network Security Competency Assessment' instrument has been
developed specifically for SHEs. Both entities are now ready for new applications and changes as a
result of their testing and continuous enhancement.
Explain who will your research be relevant to including the relevant research community. Think
in terms of the ‘stakeholders’ we discussed who may benefit from your research, andexplain
how so.
Managerial employees, finance executive officers, and product marketing professionals make up
the usual participants in an information security project. It is the stakeholders who are in
responsible of smart cities' cybersecurity on a big scale. Urban areas and infrastructure will only
be able to reach their full capacity if they are interconnected. The document claims everyone
should have a responsibility of keeping the system safe.
Additional Topics
2. Discuss how you would address issues of research quality and how it would be assured?
Significance refers to the degree to which data is reliable but yet having little practical value to a
business. Optimizing data validation may reduce re-fielding expenses and save time.
References List
1. Admin (2018). What is cyber security all about? [online] Comodo One. Available at:
https://one.comodo.com/blog/cyber-security/what-is-cyber-security.php.
2. Arabo, A. (2015). Cyber Security Challenges within the Connected Home Ecosystem
Futures. Procedia Computer Science, 61, pp.227–232.
3. FireEye. (2018). What is Cyber Security? | FireEye. [online] Available at:
https://www.fireeye.com/current-threats/what-is-cyber-security.html.
4. Gunarto, H. (n.d.). Ethical Issues in Cyberspace and IT Society. [online] Available at:
https://www.apu.ac.jp/~gunarto/it1.pdf.
5. Kang, W.M., Moon, S.Y. and Park, J.H. (2017). An enhanced security framework for home
appliances in smart home. Human-centric Computing and Information Sciences, 7(1).
6. Mdpi.com. (2021). Sensors. [online] Available at:
https://www.mdpi.com/journal/sensors/special_issues/Cyber-
Security_IoT_Smart_Homes.
7. Michaelides, M., Sengul, C. and Patras, P. (2021). An Experimental Evaluation of MQTT
Authentication and Authorization in IoT. Proceedings of the 15th ACM Workshop on
Wireless Network Testbeds, Experimental evaluation & CHaracterization.
8. Siddhanti, P., Asprion, P. and Schneider, B. (2019). Cybersecurity by Design for Smart
Home Environments. Proceedings of the 21st International Conference on Enterprise
Information Systems.
9. Siddhanti, P., Asprion, P. and Schneider, B. (2019). Cybersecurity by Design for Smart
Home Environments. Proceedings of the 21st International Conference on Enterprise
Information Systems.
10. Sivanathan, A., Loi, F., Gharakheili, H. and Sivaraman, V. (n.d.). Experimental Evaluation of
Cybersecurity Threats to the Smart-Home. [online] Available at:
https://www2.ee.unsw.edu.au/~hhabibi/pubs/conf/17antsiot.pdf [Accessed 27 Sep.
2021].
11. www.E-Books.org. (n.d.). E-BOOKS - E-BOOKS at a Glance. [online] Available at:
https://www.E-Books.org/about/at-a-glance.html.